Modeling and analysis of networked finite state machine subject to random communication losses

Page created by Julia Elliott
 
CONTINUE READING
Modeling and analysis of networked finite state machine subject to random communication losses
Volume 1 January 2021       ISSN: 2767-8946
                                                                                                                                    MMC, 3(1): 50–60
                                                                                                                                    DOI:10.3934/mmc.2023005
                                                                                          Mathematical
               Mathematical Modelling                                                  Modelling and Control
                                                                                                                                    Received: 11 September 2022
                                                                                                   Editors in Chief:

               and Control                                                                      Xiaodi Li & Sabri Arik
                                                                                                                                    Revised: 07 January 2023
                                                                                                                                    Accepted: 26 January 2023
http://www.aimspress.com/journal/mmc                                                                                                Published: 15 February 2023

Research article

Modeling and analysis of networked finite state machine subject to random
communication losses
Weiwei Han1 , Zhipeng Zhang2,∗ and Chengyi Xia2,∗
1
    Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology,
    Tianjin, 300384, China
2
    School of Artificial Intelligence, Tiangong University, Tianjin, 300387, China

* Correspondence: Email: zpzhang19@126.com, xialooking@163.com.
Abstract: In networked control systems, channel packet loss is inevitable due to the restricted bandwidth, especially in control (from
supervisory controller to some remote actuators), which will lead to the occurrence of failure control. In this paper, the controllability
of networked finite state machine (NFSM) is investigated within the framework of matrix semi-tensor product (STP), where random
channel packet losses are considered. Firstly, to capture the transition dynamics under random packet losses in the control channel,
we introduce a stochastic variable to estimate the state evolution, and the variable is assumed to obey the Bernoulli binary distribution.
Meanwhile, the NFSM with random channel packet losses can be expressed as a probabilistic logic representation. Subsequently, by
means of the delicate operation of matrix STP, some concise validation conditions for the controllability with a probability of one (w.p.
1), are derived for NFSM based on the probabilistic logic representation. Finally, a typical computing instance is used to demonstrate
the validity of the proposed method. The conclusions are conducive to study the security issues of the system involving opacity, fault
detection, controller design and so on.
Keywords: semi-tensor product; networked system; finite state machine; controllability; channel packet losses

1. Introduction                                                       makes it is easier for information to be transferred by
                                                                      means of communication networks; and on the other hand,
                                                                      the introduction of communication networks renders the
    Finite state machine (FSM) has found successful
                                                                      system with many excellent performances, such as cost
applications in many complex artificial systems, including
                                                                      reduction, convenient maintenance friendly, easy tests and
network intrusion detection and cyber-physical ones. In
                                                                      so on. Hence, the control problems of NFSM have attracted
a classical finite state machine, it is assumed that the
                                                                      increasing attention and has become a very active field.
controller is close to the actuator, the event command can be
transmitted to the controlled plant instantaneously through              Generally, due to the relatively far transmission distance,
the control channel. After decades of development, many               it is inevitable to introduce delays or packet losses between
problems for such these systems have been well studied,               supervisory controller and actuator. Specifically, an event
such as monitor theory [1], state estimate and detectability          occurring spontaneously or a control command generated
[2], controllability [3, 4] and so on. It is important to             by the monitor could be transferred at random in the
note that [5–7] converting the cyber-physical systems in the          model of NFSM. If the monitor is designed without
logical networks and obtained a series of meaningful and              considering the delays or packet losses in the control
innovative results about the cyber-physical system. On the            channel (from supervisory controller and actuator), the
one hand, the need for the interconnection of all things              command issued by a supervisor may not be effectively or
Modeling and analysis of networked finite state machine subject to random communication losses
51

successfully accepted by the plant. Hence, in consideration           controllability w.p. 1 are given for NFSM on the basis
of the complex evolutionary behavior, the modeling and                of the transition probability matrix.
analyzing of communication delays and packet losses has
                                                                   The remaining sections are structured as follows: Section
given rise to new challenges. Meanwhile, the utilization
                                                                 2 brings in some basic notations and knowledge about
of communication networks in the control loops have
                                                                 the NFSM and matrix STP. Section 3 focuses on the key
also considerable theoretical and practical significance for
                                                                 results of this paper, including the algebraic representation
NFSM.
                                                                 for NFSM with random channel packet losses, and the
  From the analysis of the current literature, many
                                                                 validation criteria for the existence of controllability. In
researches on NFSM almost always concentrate on the
                                                                 section 4, one typical simulation example is illustrated to
channel delays, such as centralized control [8] and
                                                                 validate the proposed results. Finally, in Section 5, we
decentralized control [9], robust control [10] and distributed
                                                                 summarize the whole paper and give a brief prospect of the
failure prognosis [11] and so on.      In recent years, Lin
                                                                 future study.
[12] investigated the bounded communication losses in the
control and observation channel from the perspective of
                                                                 2. Basic notations and preliminaries
supervisory control, and obtained the existence conditions
for networked supervisor, i.e., network observability and
                                                                   • N + is said to be the set of all positive integers.
controllability need to be met simultaneously.           Up to
                                                                   • Mm×l is expressed as the set of m × l-dimensional real
now, There are fewer works to address the issues on the
                                                                      matrices.
controllability problem with communication losses in the
                                                                   • A(i, j) ∈ Mm×l represents the element with the i-th row
control channel, except our previous work [13], which has
                                                                      and j-th column of matrix M.
solved the reachability problem with communication losses
                                                                   • The j-th column of A ∈ Mm×l can be expressed as
from a switched perspective. However, in [13], we assumed
                                                                      Col j (M), and furthermore, the set of all columns is
that the communication losses occur determinately, i.e.,
                                                                     Col(M).
the probability of random channel packet losses from the             W
                                                                   •   is termed as the logical ‘OR’ operation.
controller to the actuator is not considered, which lacks the
                                                                   • 1n = [1, 1, · · · , 1].
strict quantitative analysis for random packet losses.                     | {z }
                                                                                      n
  Inspired by the methods in [13], i.e., matrix STP method,        • δkn is the k-th column of identity matrix In , k ∈
this paper continues to study the influence of random packet          {1, 2, · · · , n}.
losses on controllability in the control channel of NFSM.          • ∆n := {δ1n , δ2n , · · · , δnn }.
We refer to the work in [8], and assume that all the events        • ν = [ν1 , ν2 , . . . , νn ]T ∈ Rn is said to be sub-stochastic
are disabled by default, and then, construct another finite           logical vector if every element is satisfied that νi ≥ 0
                                                                      and ni=1 νi 6 1; Especially, it is defined as stochastic
                                                                          P
state machine affected by packet losses, where the set of
                                                                      logical vector if ni=1 νi = 1.
                                                                                       P
transitions with communication losses are disabled and the
predecessor of such transitions will remain unchanged with         • The set of n-dimensional sub-stochastic logical vector
respect to the lost events. To characterize the dynamics              is denoted by L̃ns , making Lns as the set of n-
with random channel packet losses, the state estimator                dimensional stochastic logical vector.
is introduced by utilizing a stochastic variable, which is         • E[y] is called the expected value of sub-stochastic or
assumed to obey the Bernoulli random binary distribution.             stochastic logical vector y.
Some key contributions include the following points:               • Σ∗ denotes the set, which is composed of all finite-
                                                                     length and non-empty strings on the finite set Σ.
  • The matrix expression of NFSM with random channel
     packet losses in control is proposed by an algebraic          In the classical FSM, the distance from controller to
     state space method.                                         actuator is assumed to be close, and the supervisory
  • The validation criteria for the reachability and             command can be transmitted to the plant instantaneously

Mathematical Modelling and Control                                                                       Volume 3, Issue 1, 50–60
52

through the control channel. In general, the finite state                                      δm+2
                                                                                                mn , · · · , δmn
                                                                                                              (n−1)m+2
                                                                                                                       , · · · , δm
                                                                                                                                  mn , · · · , δmn ],
                                                                                                                                                nm
                                                  
machine can be briefly written as G = Q, Σ, f, q0 , and
                                                                                           j
it consists of four-tuple, including the set of events Σ and                        where δmn is termed as the j-th column of identity
states Q from the initial state q0 , the (partial) state transition                 matrix Imn
function f : Q × Σ → Q, generating all possible transitions
                                                                               (2) Given a matrix of arbitrary dimension X ∈ Mm×n , if it
f = {(q, σ, q0 ) : f (q, σ) = q0 }. Additionally, the transition
                                                                                    is supposed that X (0) := In , then for k ∈ N + , the STP
function f can be generalized over Σ∗ by an iterative way.
                                                                                    power is denoted by
  Due to the relatively far transmission distance, it is noted
that packet losses between the supervisory controller and                                              X (k) := |             }.
                                                                                                                      n ··· n X
                                                                                                                X n X {z                                (2.2)
actuator will be introduced inevitably. According to the                                                                    k
actual situation of engineering system modeling and the
information transmission network, those transitions affected                     The STP-based algebraic state space method can be
by the actuators that are far away from the supervisor may                    described as the following two procedures:
be lost at random. We define such transitions as the set
                                                                                 • Firstly, by using the matrix STP, the logical variables
fl ⊆ f , and the remaining transitions are supposed to not
                                                                                    involved in the system are represented by a vector of
be absolutely lost, which is written as ful = f − fl . That is,
                                                                                    finite dimensions (xi ∼ δin );
the set of all transitions can be divided into two parts, i.e.,
                                                                                 • Secondly, the logical dynamic system is transferred into
f = fl ∪ ful . In view of the above condition, a NFSM can be
                                                                                    a bilinear system on the finite state set. The bilinear
characterized as A = {A, fl }.
                                                                                    representation is used to study the process of the logical
  At the beginning of the 21-st century, a novel algebraic
                                                                                    dynamic system.
framework is proposed on the basis of the matrix semi-
tensor product, which transforms the logic dynamic system                        In accordance with the modeling process of algebraic
into algebraic representation and extends the application                     state space method, a NFSM A can be redefined as
scope of the classical linear state space approach. Since     Q = {q1 , q2 , · · · , qn } and Σ = {σ1 , σ2 , · · · , σm }, and these
then, the STP-based algebraic state space method has variables are further set as qi = δin (i ∈ {1, 2 . . . , n})
inspired and generated an abound of excellent works in and σk = δkm (k ∈ {1, 2 . . . , m}). Meanwhile, for
related areas, such as logic control networks [14–20], multi- the convenience, we list some variable symbols used
agent systems [21], networked evolution games [22–25] and later.      qul (ς) = [qul        1 (ς), q2 (ς), · · · , qn (ς)]
                                                                                                    ul              ul    T
                                                                                                                            (ql (ς) =
discrete event systems [26–28] and so on [29]. First of all,                  [ql1 (ς), ql2 (ς), · · · , qln (ς)]T ) is expressed as the vector form of
for the convenience of understanding, we give some related                    state reached at t steps with (no) control packet loss, and
                                                                               i (ς) = 1 (qi (ς) = 1) is defined if, and only, if there is
                                                                              qul
definitions and properties of matrix STP.                                                  l

                                                                              a transition that qi is reachable from q0 with (no) control
Definition 2.1 ( [30]). Given two matrices of arbitrary
                                                                              packet loss; u(ς) = [u1 (ς), u2 (ς), · · · , um (ς)]T is termed as
dimensions H ∈ Mm×n , D ∈ M p×q , the corresponding STP
                                                                              the event vector on Σ, and uk (ς) = 1 if σk is enabled at ς
(‘n’) of H and D is defined as:
                                                                              steps. In the next section, we present the model dynamics
                H n D := (H ⊗ Ir/n )(D ⊗ Ir/p ),                      (2.1)   and controllability analysis of NFSM with packet losses
                                                                              based on the representations.
where r is called the least common multiple of n and p.
                                                                              3. Controllability under random channel packet losses
(1) For χ ∈ Mm×1 , ϕ ∈ Mn×1 , the pseudo-commutativity of
     χ and ϕ is satisfied that ϕ n χ = Ψ[m,n] n χ n ϕ, where
                                                                              3.1. Models for random channel packet losses
     Ψ[m,n] is a constructed swap matrix, defined as:
                                                                                 In networked control systems, channel packet loss is
        Ψ[m,n] =   [δ1mn , δm+1
                            mn , δmn , · · ·
                                  2m+1
                                               , δ(n−1)m+1
                                                  mn       , δ2mn ,           inevitable due to the restricted bandwidth, especially

Mathematical Modelling and Control                                                                                         Volume 3, Issue 1, 50–60
53

in control (from supervisory controller to some remote                      hypothesized to be transmitted through the control channel,
actuators), which will lead to the occurrence of failure                    and Figure 1 shows the state transition relationship among
control. Firstly, given a NFSM A = (A, fl ),                                various states.        Otherwise, the newly constructed finite
                                                                            state machine is represented as Figure 2. Note that the
Assumption 3.1. Before we present the main results, some
                                                                            added self-loops in Figure 2 are represented by the dashed
assumptions are made in the following:
                                                                            arrows on account of the communication losses, which can
  1. Each event in Σ is disabled by default, and is only                    be obtained by substituting (q1 , σ2 , q3 ), (q3 , σ1 , q2 ) with
     allowed to occur if it is enabled by a control command.                (q1 , σ2 , q1 ), (q3 , σ1 , q3 ), respectively.

  2. The communication losses are random, i.e., the                                                          1
                                                                                                   q1                     q2       1
     transitions in fl may or may not be communicated in
     control.
                                                                                                  2         1               1, 2
  On the one hand, if the transitions in set fl are assumed
to be communicated successfully in the control channel,                                             q3                   q4
the algebraic representation can be constructed in a manner                                                  2
similar to that described in the reference [13], and the                             Figure 1. NFSM with no control packet loss.
dynamics of NFSM is shown as a discrete-time bi-linear
form in the following form:
                                                                                                                  1
                                                                                             2        q1                     q2       1
                q (ς + 1) = F n u(ς) n q (ς),
                  ul                 ul            ul
                                                                    (3.1)

where F ul is called the state transition structure matrix with                                                                1, 2
no control packet loss, and it is specifically defined as
                                                                                                               2
                                                                                             1         q3                    q4
              F ul := [F1ul , F2ul , · · · , Fmul ] ∈ Mn×mn ,       (3.2)
                                                                                  Figure 2. NFSM with the control channel packet
where Fkul ∈ Mn×n is defined as:                                                  loss.
                                   j
                               1, δn ∈ f (δin , δkm )
                              
                   ul
                             =
                              
                  Fk( j,i)                                          (3.3)      According to (3.2) and (3.3), we define a new structure
                               0, otherwise.
                              
                                                                            matrix F l := [F1l , F2l , · · · , Fml ] ∈ Mn×mn for the constructed
  On the other hand, if the transitions in fl fails to be NFSM, and the dynamics with control packet losses will be
communicated to the plant, such transitions are disabled and iterated according to the following equation:
will be permitted to occur until the transitions are not lost
in a later step. In particular, for (q, σ, q0 ) ∈ fl , not any                                 ql (ς + 1) = F l n u(ς) n ql (ς).            (3.4)
transition labeled by σ is enabled from state q to q . In this  0

situation, state q will remain unchanged in itself with respect                However, the dynamics expressed by (3.1) and (3.4)
to event σ under communication losses, which will alter the can characterize both cases with complete communication
transition structure of NFSM. In order to characterize such losses, and the case with no packet loss. In practice, the
changed transitions, we construct a new finite state machine,               losses in the control channel are random, i.e., the transitions
in which the transitions will be replaced with a self-loop                  in fl may or may not be communicated in the control
if (q, σ, q0 ) ∈ fl is not transmitted to the performer. Let’s channel. So as to cope with the random packet losses, we
illustrate the above process with a simple example.            introduce a state estimation with random channel packet
                                                                            losses, which can be depicted as follows:
Example 3.1. Consider a NFSM A = (A, fl ), where fl =
{(q1 , σ2 , q3 ), (q3 , σ1 , q2 )}, and if the transitions in fl are                           q(ς) = (1 − γ)qul (ς) + γql (ς),             (3.5)

Mathematical Modelling and Control                                                                                     Volume 3, Issue 1, 50–60
54

where γ is a random variable on behalf of the packet loss    In fact, the aforementioned theorem tells us that the
rate, which is independent of system state. Note that q(ς) NFSM with random channel packet losses can be captured
is also stochastic because it merely refers to the source of             by a special probabilistic finite state machine [31]. Next,
randomness from γ, which is indeed a random variable,                    by means of the matrix expression in Theorem 3.1,
then the expectation of q(ς) will be implemented. In this                controllability of NFSM with random channel packet losses
work, it is assumed that the communication losses may                    will be investigated.
happen according to the following Bernoulli random binary
                                                                         Remark 3.1. In the previous work [13], we discussed the
distribution:
                                                                         influence of arbitrary packet loss on the reachability, and
                                                                         a novel theoretical framework is proposed to analyze the
                 Prob{γ = 1} = E[γ] = λ                         (3.6)
                                                                         robustness of reachable state from a switched perspective.
                 Prob{γ = 0} = 1 − E[γ] = 1 − λ,                (3.7)
                                                                         Here, the controllability is studied by the matrix STP, but
                                                                         we concentrates on its analysis from a stochastic view. We
where λ ∈ [0, 1) is a constant and represents the probability
                                                                         firmly believe that the models proposed in this paper and
that any transition in fl will be lost.
                                                                         [13] provide a very important basis for studying the control
     In the following theorem, the dynamics of NFSM with
                                                                         problem with network packet loss.
random channel packet losses can be established.

Theorem 3.1. Given a NFSM A = (A, fl ) with channel                      3.2. Controllability analysis
packet loss rate λ, the evolutionary dynamics can be                       In this subsection, we continue to investigate the
described by the following stochastic logical equation:                  controllability of NFSM (network controllability), where
                                                                         random packet losses are considered. Here, the definition of
                   E[q(ς + 1)] = F u(ς)E[q(ς)],                 (3.8)
                                                                         controllability with random channel packet losses are given
                                                                         as follows:
where F = (1 − λ)F ul + λF l is termed as the probabilistic
transition structure matrix (PTSM), and E[q(ς)] ∈ Lns                    Definition 3.1. Given a NFSM A = (A, fl ) with channel
denotes the expected value of the reachable state q(ς) and               packet loss rate λ,
E[q(0)] = q0 .
                                                                         (1) from the initial state q0 = δin , the target state q j = δnj
Proof. : For any state q in the transition (q, σ, q0 ) ∈ ful ,                is reachable at the k-th step w.p. 1 (k-th reachable) if
q(ς) = q (ς) = q (ς) is satisfied. According to (3.5), (3.6)
            ul          l
                                                                              there is an event string s = σl0 σl1 . . . , σlk−1 ∈ Σ∗ so that
and (3.7), we can obtain that                                                 Prob{q(k) = q j | q(0) = q0 } = 1.

                                                                         (2) the set of all k-th reachable states from q0 is denoted
 E[q(ς + 1)] =E[(1 − γ)qul (ς + 1) + γql (ς + 1)]
                                                                              by Rk (q0 ). Furthermore, R(q0 ) is said to be the set
                 =E[(1 − γ)]E[qul (ς + 1)] + E[γ]E[ql (ς + 1)]
                                                                              of all states reachable w.p. 1 from q0 , and R(q0 ) =
                 =(1 − E(γ))F ul n u(ς) n E[qul (ς)]+
                                                                                        
                                                                              ∪i∈N + Ri q0 .
                   E[γ]F l n u(ς) n E[ql (ς)]
                                                                         (3) system is said to be controllable w.p. 1 from q0 if
                 =((1 − λ)F + λF )u(ς)E[q(ς)].
                              ul      l
                                                                (3.9)
                                                                              R(q0 ) = ∆n .

     For state q in the transition (q, σ, q0 ) ∈ fl , q(ς) = qul (ς) =     Let us first introduce the notion of k-th transition
 l
q (ς) may be not satisfied. Generally, it is not hard to get that        probability matrix (TPM) with some sequence of events.
E[q(ς + 1)] equals to E[(1 − γ)qul (ς + 1) + γ0] or equals to            Consider a NFSM with random channel packet losses.
E[(1 − γ)0 + γq (ς + 1)]. To sum up, E[q(ς + 1)] = ((1 −
                    l
                                                                         Suppose a specified input u(ς) = δkm , Theorem 3.1 means
λ)F ul + λF l )u(ς)E[q(ς)] represents the state transitions of           E[q(ς + 1)] = F δkm E[q(ς)] = Fk E[q(ς)]; in this case,
NFSM with random packet loss rate.                                      Fk ∈ Mm×n is called the first step TPM from the current state

Mathematical Modelling and Control                                                                             Volume 3, Issue 1, 50–60
55

q(ς) to the next q(ς + 1) with the input u(ς), and rewritten as Theorem 3.3. Given a NFSM A = (A, fl ) with channel
P1 . Denote k-th TPM by Pk ∈ Mn×n , whose (i, j) entry is packet loss rate λ,
Prob{q(t + k) = q j | q(ς) = qi }, i.e., the probability from the
                                                                  (1) the target state q j = δnj is k-th reachable from q0 = δin
state vector q(ς) = δin to q(ς + k) = δnj under a sequence of
                                                                      iff
         c=0 u(ς +c) that is executed. By using the matrix STP
events nk−1
                                                                                               Lk( j,i) = 1;              (3.13)
and Theorem 3.1, Pk can be equivalently calculated through
the iterative computation, and established in the following             (2) the target state q j = δnj is reachable w.p. 1 from q0 = δin
proposition.                                                                 iff there is a positive integer α, such that
Theorem 3.2. Given a NFSM A = (A, fl ) with a sequence of                                                   α
                                                                                                            _
events s = σl0 σl1 . . . , σlk−1 ∈ Σ∗ , then the k-th TPM satisfies.                                              Lk( j,i) = 1;                 (3.14)
                                                                                                            k=1
                           Pk = D(k) nk−1
                                      c=0 δm ,
                                           lc
                                                               (3.10)
                                                                        (3) the NFSM is controllable w.p. 1 from q0 = δin iff the
where D(k) = (F Ψ[n,m] )(k) Ψ[mk ,n] ∈ Mn×nmk , and Ψ[n,m] can
                                                                             positive integer α satisfies the following condition
be referred to the pseudo-commutativity.
                                                                                                          α
                                                                                                          _
Proof. Based on the matrix expression (3.8), we have the                                                        Coli (Lk ) = 1n .               (3.15)
following result:                                                                                         k=1

     E[q(1)] = F Ψ[n,m] E[q(0)]u(0)                                     Proof. (1) ‘if’ part: According to the definition of operator
                                                                                                              D     E
     E[q(2)] = F Ψ[n,m] E[q(1)]u(1)                                     h•i in Eq. (3.12), Lk( j,i) = 1, i.e., D(k)   = 1 iff there is a
                                                                                                                                  ( j,i)
                  = (F Ψ[n,m] ) E[q(0)]u(0)u(1)
                               (2)                                      positive integer β ∈ {1, 2, . . . , mk }, such that (D(k)
                                                                                                                              β )( j,i) = 1.

             ..                                                         According to (3.11), it means that a sequence of events
              .                                                         s = σl0 σl1 . . . , σlk−1 ∈ Σ∗ exists that (D(k) nc=0 δm )( j,i) = 1,
                                                                                                                          k−1 lc

     E[q(k)] = F Ψ[n,m] E[q(k − 1)]u(k − 1)                             i.e., Pk( j,i) = 1 is satisfied.             Then, an input string s =
                  = (F Ψ[n,m] ) E[q(0)]
                               (k)
                                           nk−1
                                            c=0   δlmc                  σl0 σl1 . . . , σlk−1 ∈ Σ can satisfy the condition Prob{q(k) =
                                                                                                  ∗

                                                                (3.11) q j | q(0) = q } = 1.
                                                                                      0
                  = (F Ψ[n,m] )(k) Ψ[mk ,n] nk−1
                                             c=0 δm E[q(0)].
                                                  lc

                                                                           ‘only if’ part: If state q j = δnj is k-th reachable from q0 =
  If (F Ψ[n,m] )(k) Ψ[mk ,n] is abbreviated as D(k) , then, k-th TPM δi , we prove that Lk = 1 is satisfied. Based on the matrix
                                                                         n                       ( j,i)
Pk with a sequence of events s = σl0 σl1 . . . , σlk−1                  expression (3.8) and Theorem 3.2, the condition shows that
∈ Σ∗ can be calculated as D(k) nk−1
                                c=0 δm .
                                     lc
                                                                       there is a sequence of events s = σl0 σl1 . . . , σlk−1 ∈ Σ∗ , such
  Theorem 3.2 reveals that the matrix D(k) ∈ Mn×nmk s                   that δnj = E[x(k)] = Pk δin , i.e., Pk( j,i) = 1, which implies
consists of the current state transition probability and the  that β ∈ {1, 2, . . . , mk } exists, such that (D(k)
                                                                                                               β )( j,i) = 1. Then
                                                                                  D       E
event strings with respect to the reachable paths of A, which clearly, L( j,i) = ( D )( j,i) = 1 is tenable.
                                                                         k            (k)

provides an important basis for system control analysis          (2) ‘if’ part: we suppose that there is a positive integer α
and design. Here, let us go further to split D(k) into mk     such  that
blocks, and D(k)
             i   ∈ Mn×n , i.e., D(k) = [D(k)
                                         1 , D2 , . . . , Dmk ].
                                              (k)          (k)                     α
                                                                                   _
To characterize the controllability of NFSM with random                                  Lk( j,i) = L1(j,i) ∨ L2(j,i) ∨ · · · ∨ Lα( j,i) = 1,
                                                                                   k=1
channel packet losses, an operator h•i is introduced and
defined by                                                              and the existence of k ∈ {1, 2, . . . , α} makes the formula
                                                                        Lk( j,i) = 1 true. Based on Eq. (3.13), the target state q j = δnj
                                                         mk
                                                          is k-th reachable w.p. 1 from q0 = δin . i.e., state q j = δnj is
       D    E                                            _
                 1 ∨ D2 ∨ · · · ∨ Dmk =
  Lk := D(k) := D(k)  (k)          (k)
                                              i . (3.12)
                                             D(k)
                                         i=1              reachable w.p. 1 from q0 = δin .
  Finally, the main results to validate the criterion are    ‘only if’ part: If state q j = δnj is reachable w.p. 1 from
derived based on the above preliminaries.                               q0 = δin , based on the result mentioned above, we can obtain

Mathematical Modelling and Control                                                                                     Volume 3, Issue 1, 50–60
56
                                                                     Wα
that Lk( 1j,i) = 1, Lk( 2j,i) = 1, · · · , or Lk( τj,i) = 1. Thus,    k=1   Lk( j,i) =   Example        4.1.        Considering                    a          networked               flexible
1 can be arrived at, where α = max{k1 , k2 , . . . , kτ }.                               manufacturing system, it is characterized as a FSM
                                                                                                              
     (3) ‘if’ part: If there is a positive integer α such that                           A =        Q, Σ, f, q0 , and its corresponding evolution
 α
 _                                                                                       graph is depicted in Figure 3, where Q = {q1 , · · · , q9 }
       Coli (Lk ) = Coli (L1 ) ∨ Coli (L2 ) ∨ · · · ∨ Coli (Lα ) = 1n ,                  and Σ = {σ1 , · · · , σ4 } denote the different states and
 k=1
                                                                                         signal indicators. Due to the relatively far transmission
it is satisfied that Lk(1,i)
                        1
                             = 1, Lk(2,i)
                                     2
                                          = 1, · · · , L(n,i)
                                                        kτ
                                                              = 1,distance, it is assumed that the occurrences in fl =
where ki ∈ {1, 2, . . . , α}. Based on the aforementioned result, {(q1 , σ2 , q7 ), (q7 , σ3 , q1 ), (q2 , σ3 , q8 ), (q8 , σ4 , q2 ), (q3 , σ1 , q9 ),
state q j = δnj is k j -th reachable w.p. 1 from q0 = δin , (q9 , σ3 , q3 )} is communicated with channel packet loss rate
i.e., the k j -step reachable set w.p. 1 Rk j (q0 ) = q j , and                          λ = 0.25. The following graph (see Figure 4) represents the
                     
R(q0 ) = ∪ j≤α Rk j q0 = ∆n . Henceforth, the NFSM system                                state transition diagram with packet losses.
with random packet loss is thought to be controllable w.p. 1
                                                                                                                                             3
from q0 .
                                                                                                                                  1                         2
     ‘only if’ part: If the system is controllable w.p. 1 from                                                      q2                       q5                        q3
q =
 0
        δin ,   it is obvious that the reachable states w.p. 1 from                                                               2
                                                                                                                                              2
q satisfy R(q0 ) = ∆n . According to Eq. (3.13), we can
 0                                                                                                             4 3
                                                                                                                                                         1
                                                                                                                                                                    3 1

derive that Lk(1,i)
               1
                    = 1, Lk(2,i)
                            2
                                 = 1, · · · , Lk(n,i)
                                                 τ
                                                      = 1. In brief,
Wα                                                                                                       3         q8                       q4                        q9
  k=1 Coli (L ) = 1n , where α = max{k1 , k2 , . . . , kτ }.
             k
                                                                                                                                                       2

                                                                                                                                   3                   4
Remark 3.2. In this paper, the impact of random                                                                    2                                                       2
channel packet losses on the controllability of NFSM is
                                                                                                                                                         2
systematically studied. We discover that the dynamics of                                                            q6                       q1                        q7
                                                                                                                                   3                    3
NFSM with random channel packet losses can be expressed
                                                                                                                                             1
as a probabilistic finite state machine by utilizing the
state estimation, and such dynamics take into account the                                     Figure 3. The evolution graph of A, or the state
probability λ of random channel packet losses from the                                        transition diagram without any packet losses in fl .
controller to actuator, which provides us an important model
for quantitative analysis.                                                                                                              3

                                                                                                                             1                     2
Remark 3.3. On a broader note, the underlying evolution                                             3         q2                       q5                        q3             1

of the states seems analogous to that of a discrete-time                                                                     2
                                                                                                                                         2
finite Markov chain, where the transition probabilities                                                                                             1
                                                                                                                        4
depend on the packet loss.                   The results in this paper
                                                                                                   3          q8                       q4         2
                                                                                                                                                                  q9             3
are equivalent to the irreducibility of the Markov chain.
However, we put more emphasis on the controllable paths                                                                       3              4
                                                                                                              2                                                       2
from the initial state. With the assistance of matrix STP,
                                                                                                                                                    2
the algebraic representation of NFSM with channel packet
                                                                                                               q6                       q1                        q7
loss rate λ is established, and the verification criteria for                                                                 3
                                                                                                                                                                             3
the controllability w.p. 1 are derived by the k-th transition                                                                           1

probability matrix Pk .                                                                       Figure 4. State transition diagram with packet
                                                                                              losses, which is similar with Figure 2. Also note
4. Numerical example                                                                          that dashed arrows represent the lost transitions.

     In this section, we utilize a typical example to validate the                         When taking the packet loss rate into account, the
theoretical results in Section 3.                                                        evolution dynamics on NFSM can be termed as E[q(ς +

Mathematical Modelling and Control                                                                                                                Volume 3, Issue 1, 50–60
57

                                                                             3,
                                                                               1
                                                                                                                                                                                                                                                                               
                                                                                                                                                                                                                           0     0          0    0    0     0       0.25         1        0
                                                                                           2,
                                                                                                                                                                                                                                                                               
                                                                 1,
                                                                   1                         1                                                                                                                                0     0.75       0    0    0     1 0    0 0
        3 , 0.75                                     q2                                         q3            1 , 0.75
                                                                                                                                                                                                                                                                                 
                                                                              q5                                                                                                                                                                                                   
                                                                                                                                                                                                                           0     0          0    0    0     0 0    0 0.25 
                                                                  2,
                                                                    1                     1,
                                                                                            1
                                                                                                                                                                                     
                                                                                2,
                                                                                                                                                                                                                                                                                        
                                                                                  1                                                                                                                                           0     0          0    0    0     0 0    0 0
                                                                                                      1,
                                                                                                                                                                                       
                                                                                                        0.25
                                                                                                                                                                                                                                                                                          
                          4 , 0.25  , 0.25                                                                                                                                             
                                                                                           3 0.25
                                                                                                                                                                                                                                                                                            
                                                                                                                                                                   F3 = 
                                     3
                                                                                                                                                                                                                              0     0          0    0    1     0 0    0 0
                                                                                                                                                                                                                                                                                             
                                                                                                                                                                                                                                                                                             
                 3,
                   1                                  q8                     q4                  q9            3 , 0.75                                                                                                      1     0          0    0    0     0 0    0 0
                                                                4 , 0.75              2,
                                                                                                                                                                                                                                                                                                  
                                                                                         1
                                                                                                                                                                                                                                                                                                 
                                                                                                                                                                                               
                                                                                                                                                                                                                              0     0          0    0    0     0 0.75 0 0
                                                                                                                                                                                                                                                                                                   
                                                                    3,
                                                                      1              4,
                                                                                       1                                                                                                                                                                                                             
                                                   2,
                                                     1                       2 , 0.75                2,
                                                                                                                                                                                                                                                                                                          
                                                                                                        1                                                                                                                     0     0.25       0    0    0     0 0    0 0
                                                                                                                                                                                                                                                                                                         
                                                                                                                                                                                                                                                                                                           
                                                                                                                                                                                                         
                                                                                                                                                                                                                              0     0          0    0    0     0 0    0 0.75
                                                                                     2 , 0.25
                                                      q6                      q1                 q7
                                                                    3,
                                                                      1              3 , 0.25
                                                                                                          3 , 0.75
                                                                              1,
                                                                                1                                                                                                                                                                                                         
                                                                                                                                                                                                                               0       0    0    0    0     0       0        0    1 
     Figure 5. The resulting constructed state diagram                                                                                                                                                                                                                                  
                                                                                                                                                                                                                               0       0    0    0    0     0       0        0.25 0 
     with channel packet loss rate λ = 0.25.                                                                                                                                                                                                                                             
                                                                                                                                                                                                     
                                                                                                                                                                                                                               0       0    0    0    0     0       0        0    0 
                                                                                                                                                                                                                                                                                             
                                                                                                                                                                                                         
                                                                                                                                                                                                                               0       0    0    0    0     0       0        0    0 
1)] = F u(ς)E[q(ς)], and its corresponding PTSM can be                                                                                                                               F4 = 
                                                                                                                                                                                                                                                                                              
                                                                                                                                                                                                                                  0       0    0    0    0     0       0        0    0 
                                                                                                                                                                                                             
                                                                                                                                                                                                                                                                                            
written as F = {F1 , F2 , F3 , F4 }, which is calculated based                                                                                                                                                 
                                                                                                                                                                                                                               0       0    0    0    0     0       0        0    0 
                                                                                                                                                                                                                                                                                                
on Theorem 3.1. The resulting constructed state diagram is                                                                                                                                                         
                                                                                                                                                                                                                               0       0    0    0    0     0       0        0    0 
                                                                                                                                                                                                                                                                                                 
shown as Figure 5 by adding the channel packet loss rate λ =                                                                                                                                                                      0       0    0    0    0     0       0        0.75 0 
                                                                                                                                                                                                                       
                                                                                                                                                                                                                                                                                                
                                                                                                                                                                                                                           
0.25. In this manufacturing system, some transactions are                                                                                                                                                                         0       0    0    0    0     0       0        0    0
always assigned to accomplish important tasks, for example,
from interface states q2 , q5 to q1 . Next, we will show how to                                                                                               According to Theorem 3.3, when k = 3, the reachability
verify the controllability w.p. 1.                                                                                                                          matrix with random packet loss rate kµ=1 L(µ) can be
                                                                                                                                                                                                 W

                                                                                                                                                            obtained in the following:
                                                                                                                     
                                               1        0      0            0      0      0       0    0     0     
                                                                                                                     
                                               0        0      0            0      0      0       0    0     0                                                                                                                                                                                                      
                                                                                                                                                                                                                     1         1       0.3     1       1            1             1            1          1       
                                               0        0      0.75         1      0      0       0    0     0                                                                                                                                                                                                      
                                                                                                                                                                                                                     1         0.6     0       0       0            0.8           0.3          1          1 
                                                  0        0      0            0      0      0       0    0     0
                                                                                                                                                                                                                                                                                                                     
                                                                                                                                                                                                                     0.1       1       1       0.8     1            1             0.3          0.3        0.2 
        F1 = 
                                                                                                                                                                                                      
                                                  0        1      0            0      0      0       0    0     0
                                                                                                                                                                                                                                                                                                                           
                                                                                                                                     
                                                                                                                                                         3
                                                                                                                                                                                                        
                                                                                                                                                                                                                           1         1       1       1       1            1             0            0.3        0.3 
                                                  0        0      0            0      0      0       0    0     0
                                                                                                                                                            _
                                                                                                                                                                  L(µ)                 = 
                                                                                                                                                                                                                                                                                                                             
                                                                                                                                                                                                                              1         1       1       1       1            1             0.3          0.3        0.3 
                                                                                                                                                                                                         
                                                                                                                                           
                                               0        0      0            0      0      0       0    0     0                                        µ=1
                                                                                                                                                                                                                                                                                                                              
                                                                                                                                                                                                                     1         0.3     0.3     1       0            1             1            1          1 
                                                  0        0      0            0      0      0       0    0     0
                                                                                                                                                                                                                                                                                                                         
                                            
                                                                                                                                                                                                              
                                                                                                                                                                                                                           0.3       0.1     0.3     0       0.3          0.7           0.3          0.3                         
                                                  0        0      0.25         0      0      0       0    0     0                                                                                                                                                                                                                     
                                                                                                                                                                                                                              1         0.2     0       0       0            0.3           0.3          1          1 
                                                                                                                                                                                                                      
                                                                                                                                                                                                                                                                                                                                     
                                                                                                                                                                                                                          
                                                                                                                                                                                                                              0.3       1       1       0.8     1            1             0.8          0.3        0.6
                                                                                                                     
                                               0.75           0      0      0      0      0       0    0     0     
                                                                                                                     
                                               0              0      0      0      0      0       0    0     0         
                                                                                                                                                                                                                                            L(µ)
                                                                                                                                                                                                                                             (1,5) =           L(µ)
                                                                                                                                                                                                                                                                (1,2) = 1, state q1 = δ9 is
                                                                                                                                                                                                                            W3                    W3                             1
                                               0              0      0      0      0      0       0    0     0                                          Notice that                                                           µ=1                  µ=1
                                                                                                                                                            reachable w.p. 1 from q2 = δ29 and q5 = δ59 , respectively.
                                                                                                                             
                            
                                               0              1      0      0      1      0       0    0     0                 
                                                                                                                                    
        F2 =                                  0              0      1      0      0      0       0    0     0                                             When considering system information security issues,
                                                                                                                                     
                                                                                                                                        
                                                                                                                                                            some states are supposed to be safe, such as q1 = δ19 and the
                                                                                                                                       
                                  
                                               0              0      0      0      0      0       0    0     0                           
                                                                                                                                              
                                      
                                               0.25           0      0      0      0      0       0    0     0                                        state will be labeled as a target state, which is required to be
                                                                                                                                                  
                                          
                                               0              0      0      0      0      1       0    0     0                                   
                                                                                                                                                         arrived from all states. Through some iterative calculations,
                                                                                                                                                            if k = 4, the reachability matrix with random packet loss rate
                                              
                                                  0              0      0      1      0      0       1    0     0

Mathematical Modelling and Control                                                                                                                                                                                                                             Volume 3, Issue 1, 50–60
58
W4
  µ=1                                      L(µ) is computed as:                                                    Conflict of interest
                                                                                                     
                                        1     1         1     1     1     1     1     1      1                 The authors declare that there are no potential conflicts of
                                                                                                   
         
                                        1     0.6       0.3   1     0     1     1     1      1             interests.
                                                                                                       
             
                                        1     1         1     1     1     1     0.3   0.3   0.3 
                                                                                                        
                 
                                        1     1         1     1     1     1     0.3   1      1             References
                                                                                                1  .
                                                                                                         
                                           1     1         1     1     1     1     0.3   1
                     
                                                                                                       
                         
                                        1     1         0.3   1     1     1     1     1      1 
                                                                                                              1. X. Yin, S. Lafortune, Synthesis of maximally permissive
                                        0.3   0.3       0.1   0.3   0.3   0.3   0.6   0.3   0.3 
                                                                                                                supervisors for partially observed discrete event systems,
                                        1     0.3       0.3   1     0     1     1     1      1 
                                                                                                                 IEEE Trans. Autom. Control, 61 (2016), 1239–1254.
                                           1     1         1     1     1     1     0.8   0.3   0.6
                                                                                                                      http://doi.org/10.1109/tac.2015.2460391

                                                           L(µ)
                                                            (1,:) = 19 , i.e., state q1 = δ9 is reachable
                                                                     T
                                                 W4                                        1
  Clearly,                                           µ=1
                                                                                                                   2. S. Shu,          F. Lin,         Enforcing detectability in
w.p. 1, which implies that state q1 = δ19 is reachable with                                                           controlled        discrete    event      systems,            IEEE
random packet loss.                                                                                                   Trans. Autom. Control,             58 (2013),           2125–2130.
                                                                                                                      http://doi.org/10.1109/tac.2013.2251796
5. Conclusions                                                                                                     3. T. Ushio,         Controllability and control-invariance in
                                                                                                                      discrete-event systems, Int. J. Control, 50 (1989), 1507–
  In conclusion, the controllability of NFSM with random                                                              1515. http://doi.org/10.1080/00207178908953442
channel packet losses is explored, in terms of an algebraic
                                                                                                                   4. Y. Yan, Z. Chen, Z. Liu,                     Semi-tensor product
state space approach. With the help of matrix STP, the
                                                                                                                      approach to controllability and stabilizability of finite
probabilistic logic representation of NFSM with packet loss
                                                                                                                      automata, J. Syst. Eng. Electron., 26 (2015), 134–141.
rate is proposed, which converts the NFSM with random
                                                                                                                      http://doi.org/10.1109/jsee.2015.00018
channel packet losses to a special probabilistic automaton.
Then, starting from the strict algebraic derivation, some                                                          5. D. Cheng, C. Li, X. Zhang, F. He,                   Controllability
concise validation conditions for the controllability w.p.                                                            of        Boolean     networks         via     mixed      controls,
1 are obtained for NFSM. Finally, the numerical example                                                               IEEE       Contr.    Syst.    Lett.,     2    (2018),     254–259.
demonstrates that the proposed model is succinct and                                                                  http://doi.org/10.1109/lcsys.2018.2821240
effective.                                                                                                         6. G. Zhao, H. Li, T. Hou, Input-output dynamical stability
  In future studies, we are planning to address some more                                                             analysis for cyber-physical systems via logical networks,
complicated problems. For example, opacity [32, 33] is a                                                              IET CONTROL THEORY A., 14 (2020), 2566–2572.
very important concept of security information flow, and                                                              http://doi.org/10.1049/iet-cta.2020.0197
stochastic opacity with random channel packet losses can
                                                                                                                   7. L. Du,        Z. Zhang,       C. Xia,             A state-flipped
be investigated, based on the reachability concept proposed
                                                                                                                      approach to complete synchronization of boolean
in this paper.
                                                                                                                      networks, Appl. Math. Comput., 443 (2022), 127788.
                                                                                                                      https://doi.org/10.1016/j.amc.2022.127788
Acknowledgments
                                                                                                                   8. S. Park, K. Cho,             Supervisory control of discrete
  We acknowledge the funding support of the National                                                                  event systems with communication delays and partial
Natural Science Foundation of China under Grant 62203328                                                              observations, SYST. CONTROL. LETT., 56 (2007), 106–
and 62173247, Tianjin Natural Science Foundation of                                                                   112. http://doi.org/10.1016/j.sysconle.2006.08.002
China Grant No. 21JCQNJC00840 and Tianjin Research                                                                 9. S. Park, K. Cho, Decentralized supervisory control of
Innovation Project for Postgraduate Students under Grant                                                              discrete event systems with communication delays
No. 2021YJSB251.                                                                                                      based       on    conjunctive     and        permissive   decision

Mathematical Modelling and Control                                                                                                                           Volume 3, Issue 1, 50–60
59

   structures,       Automatica, 43 (2007), 738–743.                          19. R. Zhao, B. Wang, J. Feng,                       Synchronization
   http://doi.org/10.1016/j.automatica.2006.10.016                               of     drive-response        singular      boolean         networks,
                                                                                 Nonlinear Anal., Hybrid Syst., 44 (2022), 101141.
10. W. Sadid, L. Ricker, S. Hashtrudi-Zad,                     Robustness
                                                                                 https://doi.org/10.1016/j.nahs.2021.101141
   of    synchronous            communication           protocols     with
   delay      for     decentralized         control, 20. H. Li, X. Yang, S. Wang,
                                             discrete-event                                 Robustness for
   DISCRETE EVENT DYN. S., 25 (2015), 159–176.           stability and stabilization of boolean networks
   http://doi.org/10.1007/s10626-014-0184-8              with stochastic function perturbations,      IEEE
                                                                                 Trans. Autom. Control,             66 (2021),         1231–1237.
11. S,   Takai,      R.        Kumar,            Distributed        failure
                                                                                 https://doi.org/10.1109/tac.2020.2997282
   prognosis        of         discrete      event      systems       with
   bounded-delay          communications,                 IEEE  Trans. 21. Y. Li, H. Li, X. Ding, G. Zhao, Leader-follower
   Autom.         Control,          57        (2012),       1259–1265.     consensus of multiagent systems with time delays over
   http://doi.org/10.1109/tac.2011.2173419                                 finite fields, IEEE Trans. Cybern., 49 (2019), 3203–
                                                                                 3208. https://doi.org/10.1109/tcyb.2018.2839892
12. F. Lin,          Control of networked discrete event
   systems:       Dealing with communication delays and                       22. C.   Li,    Y.      Xing,   F.    He,     D.     Cheng,            A
   losses, SIAM J. Control. Optim., 52 (2014), 1276–1298.                        strategic      learning       algorithm         for       state-based
   http://doi.org/10.1137/130914942                                              games,               Automatica,     113        (2020),      108615.
                                                                                 https://doi.org/10.1016/j.automatica.2019.108615
13. Z. Zhang, C. Xia, S. Chen, T. Yang, Z. Chen,
                                                                              23. Y. Wu, D. Cheng, B. Ghosh, T. Shen, Recent advances in
   Reachability analysis of networked finite state machine
                                                                                 optimization and game theoretic control for networked
   with communication losses: A switched perspective,
                                                                                 systems,      Asian J. Control, 21 (2019), 2493–2512.
   IEEE J. SEL. AREA. COMM., 38 (2020), 845–853.
                                                                                 https://doi.org/10.1002/asjc.2303
   http://doi.org/10.1109/jsac.2020.2980920
                                                                              24. C. Li, F. He, T. Liu, D. Cheng,                      Verification
14. D. Cheng, H. Qi, Controllability and observability of
                                                                                 and    dynamics        of    group-based        potential      games,
   boolean control networks, Automatica, 45 (2009), 1659–
                                                                                 IEEE        Trans.     Control,      6     (2018),          215–224.
   1667. http://doi.org/10.1016/j.automatica.2009.03.006
                                                                                 https://doi.org/10.1109/tcns.2018.2808138
15. B. Jiang, Y. Lou, J. Lu,                   Input-to-state stability       25. C. Li, F. He, T. Liu, D. Cheng,                 Symmetry-based
   of delayed systems with bounded-delay impulses,                               decomposition of finite games, Sci. China Inf. Sci., 62
   Mathematical Modelling and Control, 2 (2022), 44–54.                          (2019), 1–13. https://doi.org/10.1007/s11432-017-9411-
   http://doi.org/10.3934/mmc.2022006                                            0
16. Y. Zhao,        Y. Liu,               Output controllability and          26. X. Xu, Y. Hong, Matrix expression and reachability
   observability of mix-valued logic control networks,                           analysis of finite automata,               Journal of Control
   Mathematical Modelling and Control, 1 (2021), 145–                            Theory and Applications,                10 (2012),          210–215.
   156. http://doi.org/10.3934/mmc.2021013                                       https://doi.org/10.1007/s11768-012-1178-4
17. B. Wang, J. Feng, D. Cheng,                       On identification       27. Z. Zhang, C. Xia, J. Fu, Z. Chen,                        Initial-state
   of    boolean         control      networks,                SIAM      J.      observability of mealy-based finite-state machine with
   Control.         Optim.,         60        (2022),       1591–1612.           nondeterministic output functions,              IEEE Trans. Syst.
   http://doi.org/10.1016/j.automatica.2011.01.083                               Man and Cyber.:              Syst., 52 (2022), 6396–6405.
18. Y. Li, J. Feng, B. Wang,                          Output feedback            https://doi.org/10.1109/tsmc.2022.3145449
   observability          of       switched          boolean        control   28. Z. Chen, Y. Zhou, Z. Zhang, Z. Liu,                  Semi-tensor
   networks,         Inf. Sci., 612 (2022),                     612–625.         product of matrices approach to the problem of fault
   http://doi.org/10.1016/j.ins.2022.08.116                                      detection for discrete event systems (dess), IEEE Trans.

Mathematical Modelling and Control                                                                                   Volume 3, Issue 1, 50–60
60

   Circuits Syst. II, Exp. Briefs, 67 (2020), 3098–3102.
   https://doi.org/10.1109/tcsii.2020.2967062
29. D. Cheng, Y. Li, J. Feng, J. Zhao, On numerical/non-
   numerical algebra:      Semi-tensor product method,
   Mathematical Modelling and Control, 1 (2021), 1–11.
   https://doi.org/10.3934/mmc.2021001
30. D. Cheng, H. Qi, Z. Li, Analysis and control of Boolean
   networks: a semi-tensor product approach, Springer
   Science & Business Media, 2010.
31. Z. Zhang, Z. Chen, Z. Liu, Modeling and reachability
   of probabilistic finite automata based on semi-tensor
   product of matrices,   Sci. China Inf. Sci., 61 (2018),
   129202. https://doi.org/10.1007/s11432-018-9507-7
32. L. Mei, R. Liu, J. Lu, J. Qiu,     Matrix approach for
   verification of opacity of partially observed discrete
   event systems,      CIRC. SYST. SIGNAL PR., 2020.
   https://doi.org/10.1007/s00034-020-01462-2
33. Z.   Zhang,   S.   Shu,   C.     Xia,          Networked
   opacity for finite state machine with bounded
   communication delays,      Inf. Sci., 572 (2021), 57–
   66. https://doi.org/10.1016/j.ins.2021.04.072

 c 2023 the Author(s), licensee AIMS Press. This
is an open access article distributed under the
terms of the Creative Commons Attribution License
(http://creativecommons.org/licenses/by/4.0)

Mathematical Modelling and Control                             Volume 3, Issue 1, 50–60
You can also read